[FLOCKER] – Ransomware Victim: Ieee-apscon[.]org
![[FLOCKER] - Ransomware Victim: Ieee-apscon[.]org 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: FLOCKER
VICTIM NAME: Ieee-apscon[.]org
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the FLOCKER Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to a cyberattack targeting the IEEE Sensors Council. The threat actors, associated with the group “flocker,” claimed responsibility for breaching the organization’s online presence. The attack was conducted on July 31, 2025, and involved accessing sensitive information related to the APSCON2025 event. The compromised data includes full attendee guest lists, registration systems, and potentially confidential event details. The leak aims to expose internal information, and the perpetrators have provided a link to the stolen data via an onion (Dark Web) site. Visual evidence, such as a screenshot of the breach, is publicly available, illustrating the extent of the intrusion.
The organization targeted operates within the technology sector and is based in the United States. The breach has serious implications, potentially exposing personal and professional information of numerous attendees. The attack underscores vulnerabilities in event and registration management platforms, highlighting the risk of significant data exposure. The leak site features the claimed breach details, emphasizing the global and high-profile nature of the compromised event. No additional information about the specific data exfiltrated or the methods used by the attackers has been disclosed. This incident serves as a reminder of the importance of robust cybersecurity measures in safeguarding sensitive organizational data.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.